A
-
Active S-box
4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]
-
Advanced Persistent Threat
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]
-
ASIC
Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers [Volume 15, Issue 1, 2023, Pages 137-151]
-
Attribute-Based Encryption
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]
B
-
Blockchain
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]
-
Blockchain
Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]
C
-
Checkability
Secure Outsourcing of Two Standard Identity-Based Cryptosystems [Volume 15, Issue 2, 2023, Pages 216-229]
-
Cloud Computing Latest Threats
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]
-
Cloud Computing Security
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]
-
Cloud Computing Threats
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]
-
Cloud Security Countermeasures
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]
-
Cloud Security State-of-the-Art
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]
-
Cloud Security Taxonomy
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art [Volume 15, Issue 1, 2023, Pages 1-58]
-
Consensus Algorithm
Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]
-
Constant Number of Pairings
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]
-
Contactless Smart Card
Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]
D
-
Diffusion layer
4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]
-
Distributed Pixel
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]
-
Dynamic analysis
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]
E
-
Ethereum
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]
-
EV1
Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]
-
Ev2
Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]
-
EV3
Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]
-
Evasion methods
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]
-
Event Aggregation
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]
F
-
Fragile Watermarking
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]
G
-
Garbled Circuits
MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]
-
Generalized Jacobians
Oblivious Transfer Using Generalized Jacobian of Elliptic Curves [Volume 15, Issue 2, 2023, Pages 260-273]
-
Generative adversarial network
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [Volume 15, Issue 2, 2023, Pages 240-253]
-
GMW Protocol
MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]
H
-
Hamming Code
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]
-
Heterogeneous Event Logs
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]
-
Hierarchical Deterministic Wallets
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]
-
Hierarchical Threshold Access Structure
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]
-
High-throughput
Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers [Volume 15, Issue 1, 2023, Pages 137-151]
I
-
Identity-Based Encryption
Secure Outsourcing of Two Standard Identity-Based Cryptosystems [Volume 15, Issue 2, 2023, Pages 216-229]
-
IMAGE RECONSTRUCTION
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]
-
Internet of Things
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]
-
Intrusion Kill Chain
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]
-
IoT
Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]
M
-
Machine Learning
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]
-
MDS matrix
4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices [Volume 15, Issue 1, 2023, Pages 111-124]
-
Membership Inference Attack
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [Volume 15, Issue 2, 2023, Pages 240-253]
-
MIFARE DESFire
Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]
-
Modes of Operation
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]
-
Multi-Secret Sharing
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]
-
Multi-Stage Secret Sharing
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]
O
-
Oblivious Transfer
MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]
-
Oblivious Transfer
Oblivious Transfer Using Generalized Jacobian of Elliptic Curves [Volume 15, Issue 2, 2023, Pages 260-273]
-
Outsourced Decryption
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]
-
Outsourcing
Secure Outsourcing of Two Standard Identity-Based Cryptosystems [Volume 15, Issue 2, 2023, Pages 216-229]
P
-
Payload methods
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]
-
Privacy
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [Volume 15, Issue 2, 2023, Pages 240-253]
-
Privacy-Preserving Applications
MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]
Q
-
Quantum Cryptanalysis
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]
-
Quantum Distinguishers
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]
-
Quantum Key Recovery Attack
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]
-
Quantum Related Key Attack
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]
-
Quantum Slide Attack
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]
R
-
Reverse Engineering
Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]
-
Revocation
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT [Volume 15, Issue 1, 2023, Pages 97-110]
S
-
Scalability
Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]
-
Secure Function Evaluation
MISC: Multi-Input Secure Two-Party Computation [Volume 15, Issue 2, 2023, Pages 163-177]
-
Secure Messaging Authentication Protocol
Reverse Engineering of Authentication Protocol in DesFire [Volume 15, Issue 2, 2023, Pages 254-259]
-
Security
Secure Outsourcing of Two Standard Identity-Based Cryptosystems [Volume 15, Issue 2, 2023, Pages 216-229]
-
Security Event Management
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks [Volume 15, Issue 2, 2023, Pages 178-215]
-
Sensitive methods
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware [Volume 15, Issue 1, 2023, Pages 59-71]
-
Social Secret Sharing
A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem [Volume 15, Issue 1, 2023, Pages 125-135]
-
Stability
Analysis of IOTA Tangle Stability in High Transaction Rates [Volume 15, Issue 2, 2023, Pages 152-162]
-
Steganography
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]
-
Substitution box (S-box)
Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers [Volume 15, Issue 1, 2023, Pages 137-151]
-
Symmetric Cipher
Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon’s Algorithm [Volume 15, Issue 1, 2023, Pages 83-95]
T
-
Tamper Detection
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers [Volume 15, Issue 2, 2023, Pages 230-239]
-
Transaction Address
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain [Volume 15, Issue 1, 2023, Pages 73-81]
W
-
White-Box
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network [Volume 15, Issue 2, 2023, Pages 240-253]